Presentation is loading. Please wait.

Presentation is loading. Please wait.

1SYMBOL CORPORATE PRESENTATION Wireless IPS 2.0 Comprehensive Protection for WLAN Networks.

Similar presentations


Presentation on theme: "1SYMBOL CORPORATE PRESENTATION Wireless IPS 2.0 Comprehensive Protection for WLAN Networks."— Presentation transcript:

1 1SYMBOL CORPORATE PRESENTATION Wireless IPS 2.0 Comprehensive Protection for WLAN Networks

2 2SYMBOL CORPORATE PRESENTATION Corporate Network Barcode Scanner Parking Lot BEACONS PROBES Accidental Association Malicious Association Intruder Confidential Data Soft AP Neighboring WLAN Rogue Devices signals bleed around physical walls and firewalls Threats from Wireless Devices Hardware AP Wireless Laptop Ad-Hoc Rogue Access Point Intruders or hackers can launch attacks (DoS, Identity Theft) Associations accidental, malicious; peer-to-peer/ad hoc. VPN & Authentication don’t help Bridging wireless laptops: opens back doors and exposes wired network Wireless Phishing: can hijack users at hotspots (AirSnarf, Hotspotter, Evil Twin)

3 3SYMBOL CORPORATE PRESENTATION Symbol Wireless IPS Solution Real-time Monitoring Multiple Correlation, Analysis & IDS Engines Integrated Reporting Centralized Server AP300 Sensor AP300 Wireless Stations Hacker Rogue Access Point Remote, Secure Browser AP300 Sensor Scanning 802.11 a/b/g Selective Processing, Encryption Centralized Management Designed for Enterprise Scalability & Central Management AP300

4 4SYMBOL CORPORATE PRESENTATION Using AP300s as Sensors Symbol ships AP300 as a single SKU AP300 can be converted to a Sensor (and back to AP) Enterprise Class 802.11 a/b/g hardware Sensors are independent of wireless switch Sensor firmware in flash Sensor is IP addressable – can be used across LAN 2-radio design allows for better scanning, or scan while terminate Coverage for multiple APs Monitors all devices in 40,000 – 60,000 square feet (~3700 – 5600 square meters) range Typically one deployed for every 4 AP’s AP300: 802.11a/b/g

5 5SYMBOL CORPORATE PRESENTATION Functionality Most comprehensive wireless intrusion prevention functionality Automated threat & rogue mitigation Centralized policy definition, monitoring & enforcement Industry regulation compliance monitoring Enterprise-ready solution Secure & hardened server Centrally-Managed Remote troubleshooting of WLANs Detailed reporting Rogue Management Advanced Detection Automated Defenses Forensic Analysis Forensic Analysis Anywhere Protection

6 6SYMBOL CORPORATE PRESENTATION Automated Defenses Automated, policy-based Active Defenses Wireless or wired-side mitigation 3 Total Wireless Intrusion Protection Threat-based Rogue Management Analyze real rogue threats (vs. long list of rogues) Pinpoint Rogue on my Network Locate, Terminate 1 Attack/ Threat Detection Most accurate & comprehensive detection Known & day zero attacks 2 5 Forensic Analysis Incident analysis What, when, how, who? Anywhere Protection Threats to mobile users Notify, enforce policy Enterprise Integration 4 Rogue Threat Management Advanced Detection Automated Defenses Forensic Analysis Anywhere Protection

7 7SYMBOL CORPORATE PRESENTATION Threat-based Rogue Management Detect Rogue Devices / Associations  Hardware APs, Soft APs  Wireless ready laptops  Specialty Devices (barcode scanners)  Ad-hoc networks  Accidental/ Malicious Associations 1 Calculate Threat Index  Threat-based Management  Partitioning of Friendly Neighboring Networks till they get malicious 2 Analyze Rogue Connections  In-depth analysis of the activity level of each rogue  How long it existed  Who was connected to the rogue  What and how much data transmitted 3 Locate Rogue Devices  Real-time accurate location tracking of all devices (release 2)  No client software required 4 Terminate Rogue Devices  Policy-based & manual termination  Via air – AirLockdown  Wired port suppression (release 2) 5 Highest Risk Innocent Neighbor AP Least Risk Connection to Neighbor AP Rogue AP in my building Connection to Rogue AP & transferring data Rogue AP on My Network

8 8SYMBOL CORPORATE PRESENTATION Accurate Detection of Threats & Attacks Correlation Across Sensors Stateful Analysis Statistical Base-lining and Aggregation Anomalous Behavior Protocol Abuse Signature Analysis Policy Manager Correlation Goal: Detect all known and day zero threat and attacks reliably Challenge: It is a race with hackers. New threats are evolving rapidly Simple threats & issues can be detected at the sensor ACCURATE ALARMS Threat Index Multiple Detection Technologies are required for accurate & comprehensive detection Many threats require correlation across sensors (certain identity theft) Day Zero attacks require anomalous behavior analysis Correlation across multiple detection engines reduces false positives Focus on threat index by location or sensor rather than individual alarms

9 9SYMBOL CORPORATE PRESENTATION Ensures Policy Compliance Adopt security policies and procedures to address the security weaknesses of the wireless environment DOD DHS SOX HIPAAGLBA FDIC OCC Symbol Enables Compliance with Monitor for Compliance  Compliance with Corporate, regulatory requirements?  Network performing correctly? Monitor for Compliance Enforce Turn off SSID broadcast Change channel of AP Terminate Enforce Define Policy  Security  Configuration; VLANs  Performance  Vendor / Channel Define Policy Closed Loop Compliance Monitor Enforce Define

10 10SYMBOL CORPORATE PRESENTATION Operational Support: Remote Troubleshooting In widely distributed wireless deployments, remote troubleshooting tools are critical to ensure administrators are able to diagnose and correct end-user issues centrally.  Ongoing collection of performance statistics  Device connection history  Built-in Channel reports for troubleshooting RF problems Historical Analysis  Real-time device analysis  Real-time device tracking  Real-time Layer 2 decoding  Full, remote frame capture Real-time Analysis Live Real-time Analysis Heavily Congested Channels Network Utilization

11 11SYMBOL CORPORATE PRESENTATION Self-Managing Platform  High Performance  Zero-Config Sensors  Secure Sensors  SSL/Digital Certificates  Hardened OS  WLAN Management  Device/Security/DB Mgmt  Tivoli, OpenView  Adjustable Views  Notify by Role, Location  Accurate Termination  Policy based Rules Easy to Deploy & Manage DEPLOYABLE MANAGEABLE

12 Wireless IPS 2.0 New Product Feature Set

13 13SYMBOL CORPORATE PRESENTATION Wireless IPS: New Features Enhanced GUI Location services Increased Visibility to Threats Improved Control and Response Increased Scalability and Depth of Forensic Analysis VISA CISP reporting

14 14SYMBOL CORPORATE PRESENTATION Multiple Dashboards based on administrative roles Domain-based partitioning to allow full or partial access New advanced filtering options Easy recreation of events for on-going customer support Enhanced GUI – An Intuitive Interface for Manageability Manager Dashboard Performance Dashboard Role-based Dashboards

15 15SYMBOL CORPORATE PRESENTATION Sensor-less Rogue Detection and Correlation Ability to detect rogue wireless devices in “No Wireless” environments through wired- side rogue discovery Correlated rogue detection with sensors and wired rogue discovery for optimized security at lowest cost Built-In Location Tracking Network Map providing full connectivity information at a glance Built-in RF triangulation based location tracking with advanced path loss algorithm Architected for the future: integrate other best-in-class location engines Network Mapping and Location Signal Triangulation Network Map Location Tracking

16 16SYMBOL CORPORATE PRESENTATION Tooled to Detect over 200 Events Enhanced event correlation and historical trending Adaptive learning based on statistical analysis of events over time Simultaneous adaptive scanning provides increased visibility across the wireless network Increased Visibility to Threats Rogue Device Analysis Key Security Metrics including overall threat level; Rogue threats; Intrusion threats; Policy Compliance; Threats to wireless stations and List of Alarms.

17 17SYMBOL CORPORATE PRESENTATION Enhanced Wireless or Wired-side termination methods – AirLockdown executed across multiple sensors – Wired port suppression Continuous scanning of network during AirLockdown process provides uninterrupted protection from attack Simultaneous termination of multiple rogues Full auditability of the termination action Flexible notification options Enhanced Control and Response Threat Mitigation is automated, simple and policy-driven

18 18SYMBOL CORPORATE PRESENTATION Increased Scalability for Enterprise Deployments 100,000 concurret wireless devices 300 sensors/servers Low wide area network bandwidth utilization (3-5Kbps) RF Review with Forensic Analysis More data collected and stored over a long period of time Adaptive learning system – even fewer false positives Ability to easily replay events Increased System Scalability and Depth of Forensic Analysis

19 19SYMBOL CORPORATE PRESENTATION Expanded Compliance and Management Reporting Compliance reports include GLBA, HIPAA, DoD, Sarbanes Oxley, Visa-CISP, PCI Vulnerability Assessment Platform Management and Reporting Secure and Simplified Platform Management ‘Secure Platform’ available for selected hardware appliance Continued self-health monitoring for system integrity Fail safe architecture Management Reporting

20 20SYMBOL CORPORATE PRESENTATION Service Features Purchasing annual support for Wireless IPS entitles customers to: 24 x 7 Ready-Access to Technical Resources Telephone and e-mail support Problem isolation, analysis and resolution of software operational issues Product Updates Major and Minor releases of software and documentation Access to MySymbolCare Service website for electronic distribution of support information including support management tools, product and technical literature, and more. NOTE: Wireless IPS Software Support does not include hardware repair or replacement coverage for the AP300 sensors. Any required hardware repair or replacement would be covered under the AP300

21 21SYMBOL CORPORATE PRESENTATION Wireless IPS Symbol Advantages Comprehensive security coverage of in-building, perimeter, and parking lots Utilizes “thin” sensor technology, AP300. Fast channel switching to avoid “RF blind-spots” Capture & Scanning simultaneously – (2 Radio Advantage) High Availability System: Server technology to recover from server and sensor network outages Real time vs. Off-line 802.11 protocol analysis – essential for proper troubleshooting Easily Scalable to over 100,000 MU’s Accurate Reporting Correlation of attacks over multiple sensors to avoid False Positives Configurable alarm thresholds and alerts Scalability for distributed environments: Low WAN bandwidth usage with Split-Analysis in the sensor Low Cost of Maintenance Easy, centralized updates Low Cost of Installation Uniform ceiling infrastructure (same AP300 SKU) Added Flexibility Sensor can be converted to Access Port in case of AP failure

22 uestions ?


Download ppt "1SYMBOL CORPORATE PRESENTATION Wireless IPS 2.0 Comprehensive Protection for WLAN Networks."

Similar presentations


Ads by Google